Description

A new, more sophisticated phishing campaign has begun to take advantage of the trust in cloud hosting services such as Cloudflare Pages and Zendesk to enable massive credential theft. Researchers have identified more than 600 domains operating on the .pages.dev structure, which were created with an eye to impersonating legitimate customer support portals. Attackers use typosquatting to register domains that closely resemble authentic services and trick users into thinking they are engaging with trusted brands. EclecticIQ cyber threat intelligence analyst Arda Buyukkaya said that such campaigns reflect a current trend in which adversaries abuse well-known infrastructure services to run social engineering attacks. The phishing pages, most of them AI-generated, have very believable designs, resembling legitimate business support sites. Each of the pages has an interactive live chat interface moderated by human operators who interact with the victims themselves, adding to the impression of authenticity. Social engineering is a key factor in the attackers' strategy. The operators, during the chat, ask for personal information from the users, such as phone numbers and email addresses, on the pretext of giving them technical support. With that done, they convince the victims to install Rescue, a legitimate remote monitoring tool, which opens up full access of the device once installed. Such access allows them to harvest sensitive data, login credentials, and financial data without raising any suspicions. Adding another layer of sophistication, the actors abuse Google Site Verification and Microsoft Bing Webmaster tokens for SSO poisoning, expanding their control and persistence within targeted systems. The main goal of this campaign is financially motivated account takeovers and fraud, posing a serious risk to both enterprise and individual users. This attack underlines how adversaries continue to evolve their methods, weaponizing trusted technologies to bypass traditional cybersecurity defenses.